IT Security Policy Development: Management Policies and Procedures
14 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the first step in building an IT Security Plan?

  • Security Audit
  • Risk Assessment (correct)
  • Implementation Plan
  • Developing a Security Policy

What does the Risk Assessment involve?

  • Implementation of security procedures
  • Creating a Security Organization
  • Inventory of information assets and estimation of their value (correct)
  • Conducting a security audit

What is the purpose of developing a Security Policy?

  • Implementing security procedures
  • Creating a Security Organization
  • Prioritizing information risks and setting acceptable targets (correct)
  • Conducting a security audit

What should the Security Policy prioritize?

<p>Information risks and acceptable targets (C)</p> Signup and view all the answers

What is the first step in developing a security plan?

<p>Generating and controlling the information (B)</p> Signup and view all the answers

What is the primary purpose of an authorization management system?

<p>To establish where and when a user is permitted to access certain parts of a network (B)</p> Signup and view all the answers

What is the main focus of a MIS audit?

<p>Reviewing technologies, procedures, documentation, training, and personnel (D)</p> Signup and view all the answers

What does an access control system determine?

<p>Who can gain legitimate access to information (C)</p> Signup and view all the answers

What is the scope of task for a security organization team?

<p>Administering access controls, authentication procedures, and authorization policies (D)</p> Signup and view all the answers

What is the purpose of performing an MIS audit?

<p>To examine the firm’s overall security environment and controls governing individual information systems (A)</p> Signup and view all the answers

What is the main focus of an authorization management system?

<p>Determining different levels of access to information for different level of users (B)</p> Signup and view all the answers

What does an authentication procedure include?

<p>Use of digital signatures, certificates of authority, password, biometric, etc. (D)</p> Signup and view all the answers

What is the purpose of an access control system?

<p>Determining where and when a user is permitted to access certain parts of a network. (B)</p> Signup and view all the answers

What is the action step to achieve the security plan goals?

<p>Administering access controls, authentication procedures, and authorization policies. (A)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser